Why should the directory of one user not be generally accessible to other users (not even for read-only access)?

What will be an ideal response?


The knowledge of the existence of certain objects should not be available to unauthorized users. For example, a knowledge that Jones and Smith are working together on a project (as evidenced by shared access to many files) might be sensitive. Sometimes, testing or development versions of hardware components or software systems should not be known by all users.

Computer Science & Information Technology

You might also like to view...

These devices sometime use ranging to determine the time it takes for data to travel to the cable head-end.

What will be an ideal response?

Computer Science & Information Technology

Time in Flash is measured in ____.

A. tps B. fps C. scrubs D. ellipses

Computer Science & Information Technology

What type of wireless network connects devices through a wireless access point?

a. Ad hoc b. Infrastructure wireless network c. PAN

Computer Science & Information Technology

A model of a business in which customers walk into the store at random times employs a model that uses ____ rather than precise and exact equations.

A. probabilistic approximations B. numerical approximations C. statistical approximations D. algebraic approximations

Computer Science & Information Technology